Commit graph

17665 commits

Author SHA1 Message Date
Treehugger Robot
938d0c2bf6 Merge "Allow the kernel to read staging_data_file." 2019-01-17 01:18:47 +00:00
Nick Kralevich
4786c5d1aa rs.te: Remove dontaudit statements
am: 80eec389e2

Change-Id: I7b2dcadf15ccc06dfc39f614f6fe4459812e53c3
2019-01-16 14:41:24 -08:00
Martijn Coenen
b85acbb889 Allow the kernel to read staging_data_file.
These are APEX files in /data/staging, and will be accessed by the loop
driver in the kernel.

Bug: 118865310
Test: no denials on emulator
Change-Id: I5c849b6677566cb00d28011352b9dc6b787a0bc4
2019-01-16 21:05:26 +01:00
Nick Kralevich
80eec389e2 rs.te: Remove dontaudit statements
These dontaudit rules were in place to suppress SELinux denials due to
file descriptor leakage. The file descriptor leakage has been fixed, so
these rules are no longer necessary. Delete.

Fixes: 120983106
Test: cts-tradefed run cts-dev -m CtsRenderscriptTestCases
Change-Id: I5cad79c3526583bd2b65bd089fee9c490f6beb5e
2019-01-16 10:54:16 -08:00
Jeff Vander Stoep
ec56d3024c Merge "app: remove redundant neverallow rule"
am: 2b80559518

Change-Id: I6eaaaa6b622f2cb4135d697f870b9618216ba0c0
2019-01-16 07:45:52 -08:00
Treehugger Robot
2b80559518 Merge "app: remove redundant neverallow rule" 2019-01-16 15:28:28 +00:00
Narayan Kamath
2ad229c788 Add initial sepolicy for app data snapshots.
Define a rollback_data_file label and apply it to the snapshots
directory. This change contains just enough detail to allow
vold_prepare_subdirs to prepare these directories correctly.

A follow up change will flesh out the access policy on these
directories in more detail.

Test: make, manual
Bug: 112431924

Change-Id: I4fa7187d9558697016af4918df6e34aac1957176
2019-01-16 15:22:51 +00:00
lifr
980c08c999 Allow netd to write to statsd
config sepolicy to allow netd to write to statsd.

Test: run runtests.sh, make sure no missing test and get all pass
      run /out/host/linux-x86/bin/statsd_testdrive 82
      Got following metric data dump:pass for local test
Bug: 119862317

Change-Id: Ieff5ca55de46715d54ef57c4a6d144fd7d03e4b7
2019-01-16 13:33:18 +00:00
David Anderson
34d1f38571 sepolicy for gsid
am: 6d53efcf46

Change-Id: I8b95bb61ea7fbed3c2a2e7ce7f0895713295c340
2019-01-15 22:45:13 -08:00
David Anderson
6d53efcf46 sepolicy for gsid
Bug: 122556707
Test: gsid starts
Change-Id: Ib05ddb79051436f51cd236de04027a3b12ee87a9
Signed-off-by: Sandeep Patil <sspatil@google.com>
2019-01-15 20:43:33 -08:00
Jeff Vander Stoep
d8bec4ac72 app: remove redundant neverallow rule
Access to zygote_socket is already neverallowed to
{ domain -system_server }.

Test: build
Change-Id: I6353ef09f769c8d64c97b1bdef93f0ab4d5dae6a
2019-01-15 20:31:01 -08:00
Wei Wang
6acbe4626b Merge "Allow lmkd to renice process before killing"
am: f0dd63dbe0

Change-Id: I0b58e4ed5ca49b0171068a321b0b009a1b39d44d
2019-01-15 19:13:37 -08:00
Wei Wang
f0dd63dbe0 Merge "Allow lmkd to renice process before killing" 2019-01-16 03:06:21 +00:00
Remi NGUYEN VAN
0d94b3b154 Merge "Allow NetworkStack to find the telephony service"
am: a2e024f890

Change-Id: I19dc91b227b83c617921a6c6f11c412b3f3107e1
2019-01-15 17:46:44 -08:00
Remi NGUYEN VAN
a2e024f890 Merge "Allow NetworkStack to find the telephony service" 2019-01-16 01:29:10 +00:00
Tao Bao
832f8af08b recovery: Address the ioctl denials during wiping.
avc:  denied  { ioctl } for  pid=599 comm="mke2fs" path="/dev/block/sda13" dev="tmpfs" ino=18975 ioctlcmd=127b scontext=u:r:recovery:s0 tcontext=u:object_r:userdata_block_device:s0 tclass=blk_file
avc:  denied  { ioctl } for  pid=587 comm="mke2fs" path="/dev/block/sda20" dev="tmpfs" ino=17931 ioctlcmd=0x127b scontext=u:r:recovery:s0 tcontext=u:object_r:metadata_block_device:s0 tclass=blk_file

0x127b (BLKPBSZGET) is called by mke2fs that queries physical sector
size. Although the denial is currently non-fatal, as mke2fs falls back
to use logical sector size, it might lead to undesired result in future.

Test: Factory reset on taimen and blueline respectively.
Change-Id: I14fc6593aeae309c79f5eadcffc8158b0a2ab2f6
2019-01-15 16:08:09 -08:00
Tri Vo
93fb782149 Merge "sepolicy: unify *_contexts file install location"
am: 63f6b9eb6b

Change-Id: I00bc43e9c217fa9f595b02593c7d4229977097d3
2019-01-15 14:15:45 -08:00
Tri Vo
63f6b9eb6b Merge "sepolicy: unify *_contexts file install location" 2019-01-15 21:57:42 +00:00
Sandeep Patil
68dbdcf19c Merge "Allow init to relabel metadata block device."
am: fae37428f1

Change-Id: I0dceec8bb5f853a916a6d9870ed381e1b43f9dd0
2019-01-15 11:34:01 -08:00
Treehugger Robot
fae37428f1 Merge "Allow init to relabel metadata block device." 2019-01-15 19:20:32 +00:00
Remi NGUYEN VAN
fd758cbddb Allow NetworkStack to find the telephony service
The network stack needs access to TelephonyManager#getAllCellInfo to
send network conditions broadcasts.

Bug: 122843997
Test: Flashed, verified violation not shown and cell info obtained
properly.

Change-Id: I6ef2858c9a2d1fbbb993164a93bd985e0eee8887
2019-01-15 16:57:32 +09:00
Wei Wang
abeaa3bc92 Allow lmkd to renice process before killing
Bug: 118468011
Test: mem-pressure test
Change-Id: Icf387a02243af60a3bfffba912711f037669fa7f
2019-01-14 22:52:32 -08:00
chenbruce
fa0e90a368 SEPolicy updates for adding native flag namespace(netd).
am: e3d625b72e

Change-Id: I56ae62db0f0037460974a5632968af5b834515a3
2019-01-14 19:17:45 -08:00
chenbruce
e3d625b72e SEPolicy updates for adding native flag namespace(netd).
For experiment flag testing, we add a flag netd and have
SEPolicy updates.

Test:  add sepolicy, m -j, check GetServerConfigurableFlag function in netd
Bug:122050512
Change-Id: I21c844c277afc358085d80447f16e4c0d4eba5b3
2019-01-15 02:47:57 +00:00
Tri Vo
30207acce0 sepolicy: unify *_contexts file install location
This change installs *_contexts files to the same location on Treble and
non-Treble devices.

This was previously not possible because first stage mount was not
required on all platforms. It is now b/79758715.

Bug: 70851112
Test: m selinux_policy
Change-Id: I8124c59b129aef86d78d2ae4ebcfaecd896032fc
2019-01-14 15:43:45 -08:00
Sandeep Patil
e3ba85c330 Allow init to relabel metadata block device.
In order to boot into GSI, we need init's second-stage block-device
machinery to relable metadata. This will allow it to format / mount
the block device later

Bug: 121209697
Test: device boots

Change-Id: I4e63151767345976b5667df74530cd69fffcfa89
Signed-off-by: Sandeep Patil <sspatil@google.com>
2019-01-14 15:10:08 -08:00
Jiwen Cai
992999243e Merge "Allow app to conntect to BufferHub service"
am: 53f5375824

Change-Id: Icc852fa03100c67264e41c9543f7d64386d46c8f
2019-01-14 14:08:05 -08:00
Carmen Jackson
48f1936058 Merge "Add selinux rules for detachable perfetto process."
am: 146be01a0f

Change-Id: Idc98dfb1b1dbbb0b75bcba24f97c7f313d0442a8
2019-01-14 14:05:12 -08:00
Dario Freni
27725d59cc Merge "Allow apexd to also create dirs/files in its storage."
am: 0eb6bff5f3

Change-Id: I5f3ce94b21b6810ba879a5137907d814a0d39c95
2019-01-14 14:03:04 -08:00
Jiwen Cai
53f5375824 Merge "Allow app to conntect to BufferHub service" 2019-01-14 21:58:15 +00:00
Jeff Vander Stoep
51d92c99b3 runtime_event_log_tags_file: dontaudit map permission
In permissive mode, map denials may occur on
runtime_event_log_tags_file. Suppress.

Fixes: 122803985
Test: build
Change-Id: I4aebd4363091685185e0c5f98895c4a9301b9cfe
2019-01-14 13:01:28 -08:00
Jeff Vander Stoep
6672e2df40 Merge commit '20756085829a0d7d79463eab5a555bf4b0556f1a' into manual_merge_20756085829a0d7d79463eab5a555bf4b0556f1a
Change-Id: Ifd7b4af2c976a81bb84bd95d30261a0e2ef01628
2019-01-14 12:52:27 -08:00
Treehugger Robot
146be01a0f Merge "Add selinux rules for detachable perfetto process." 2019-01-14 20:24:32 +00:00
Dario Freni
0eb6bff5f3 Merge "Allow apexd to also create dirs/files in its storage." 2019-01-14 19:41:15 +00:00
Jiwen 'Steve' Cai
e17b293528 Allow app to conntect to BufferHub service
Bug: 112940221
Test: AHardwareBufferTest
Change-Id: I1fd065844e03c7e079dc40b7f7dbb8968f1b00bc
2019-01-14 10:49:35 -08:00
Joel Fernandes
2075608582 Merge changes from topic "bpf-init"
* changes:
  Add permissions for bpf.progs_loaded property
  Allow executing bpfloader from init and modify rules
  Assign bpfloader with CAP_SYS_ADMIN
2019-01-14 18:34:19 +00:00
Jeff Vander Stoep
846665fed4 netdomain: allow node_bind for ping sockets
am: 036090d203

Change-Id: I5cf2f70b42c0d833a91c22347ef2072c135a3d95
2019-01-14 09:12:38 -08:00
Jeffrey Vander Stoep
19c8701b8a Merge "netdomain: move to public policy"
am: 75448f8316

Change-Id: Iab295f35f2f095f4f511d3f02239551ba09708b8
2019-01-14 09:12:13 -08:00
Jeff Vander Stoep
036090d203 netdomain: allow node_bind for ping sockets
Grant for icmp_socket for devices with 4.14 or greater kernel, and
rawip_socket for devices with earlier kernels.

Bug: 122572608
Test: build
Change-Id: I1c9d2ce6761dbd2c4db3635600c5f5c335461083
2019-01-14 16:59:03 +00:00
Jeffrey Vander Stoep
75448f8316 Merge "netdomain: move to public policy" 2019-01-14 16:58:50 +00:00
Joel Fernandes
b76a639956 Add permissions for bpf.progs_loaded property
Change-Id: If4e550e4186415c5a1088bb53b0755b69f92560a
Signed-off-by: Joel Fernandes <joelaf@google.com>
2019-01-14 10:59:10 -05:00
Joel Fernandes
147cf6482e Allow executing bpfloader from init and modify rules
init needs to execute bpfloader as a one-shot service. Add sepolicy for
the same. Also update old rules allowing init to fork/exec bpfloader and
remove rules allowing netd to do so.

Bug: 112334572
Change-Id: Ic242cd507731ed8af3f8e94d4fccc95819831d37
Signed-off-by: Joel Fernandes <joelaf@google.com>
2019-01-14 10:59:10 -05:00
Joel Fernandes
4bf478828f Assign bpfloader with CAP_SYS_ADMIN
bpfloader needs to load bpf programs with tracepoints in them. The
tracepoint programs are not activated but are just loaded and pinned.
The kernel expects the process doing this to have CAP_SYS_ADMIN. Since
bpfloader was intended to be a 1-shot run and exit process with security
privileges, lets assign it CAP_SYS_ADMIN so that it is able to load the
tracepoint programs.

Bug: 112334572
Change-Id: Icf9b5d95615e69f5c28dc28f021b07f49710c97d
Signed-off-by: Joel Fernandes <joelaf@google.com>
2019-01-14 10:59:10 -05:00
Martijn Coenen
179ada913c Allow apexd to also create dirs/files in its storage.
Bug: 118865310
Test: no denials when running ApexServiceTest#SubmitSessionTestSuccess
Change-Id: I9a309fca99c23ca7db4af58db782a2bd6a83d829
2019-01-14 09:15:46 +01:00
Martijn Coenen
ca82c15817 Merge "Add persist.apexd. property context."
am: cb691fbcfd

Change-Id: I45a8a43d54b0bff2bccfe67b90ed219d0e4cb7a7
2019-01-14 00:10:46 -08:00
Martijn Coenen
cb691fbcfd Merge "Add persist.apexd. property context." 2019-01-14 07:59:12 +00:00
Sooraj Sasindran
c7065d3a23 Merge "Rename ANS to ONS"
am: 2968496e2c

Change-Id: I889631f909060a66cbd0391fc3b46b296284cd47
2019-01-12 11:27:51 -08:00
Sooraj Sasindran
2968496e2c Merge "Rename ANS to ONS" 2019-01-12 19:11:52 +00:00
Victor Hsieh
756d10a17d Merge "Allow fs-verity setup within system_server"
am: 9c654b7ca1

Change-Id: I51d4677c2f34b252b19faafaf34a9447ab7fe3aa
2019-01-11 22:17:47 -08:00
Treehugger Robot
9c654b7ca1 Merge "Allow fs-verity setup within system_server" 2019-01-12 06:03:26 +00:00